How to Use a Security Key to Protect Sensitive Online Accounts – By Kirk McElhearn intego.com
Protecting your online accounts has become more important, as so much of our lives takes place on websites, via email, and through messaging. If someone gets access to some of your accounts – especially your email account – they can get access to others, and potentially usurp your identity.
How to Protect Your Online Accounts With a Physical Security Key – By Lance Whitney pcmag.com
A password isn’t enough to fully protect your accounts and logins anymore. Websites and apps offer two-factor authentication and biometric login features, but another way to secure your accounts is through a physical security key.
You’re using your Android and Mac’s fingerprint reader all wrong – By Adrian Kingsley-Hughes zdnet.com
Fingerprint readers are great. When they work.
One thing I’ve noticed since switching to an iPhone with Face ID instead of Touch ID is how much faster and more accurate using my face is than using my fingers.
How Devices Use Wi-Fi to Determine Your Physical Location – By Chris Hoffman howtogeek.com
Did you know that laptops and other devices without GPS hardware can determine your precise physical location—with just a Wi-Fi radio? Here’s how this often-overlooked feature of modern “Location Services” works.
How to check if someone else accessed your Google account – By Andy Wolber techrepublic.com
Review your recent Gmail access, browser sign-in history, and Google account activity to make sure no one other than you has used your account.
What Is Signal, and Why Is Everyone Using It? – By Chris Hoffman howtogeek.com
Signal is a secure encrypted messaging app. Think of it as a more private alternative to WhatsApp, Facebook Messenger, Skype, iMessage, and SMS. Here’s why you should seriously consider switching to Signal.
Signal vs. Telegram: Which Is the Best Chat App? – By Chris Hoffman howtogeek.com
At the start of 2021, Signal and Telegram are on top of the app store charts. Both chat apps promise more privacy than WhatsApp, Facebook Messenger, and SMS. But there are some big differences between the two. Here’s what you should know—and which you should use.
Cyber Security Today – Make these cybersecurity New Year’s Resolutions – By itworldcanada.com
Make these cybersecurity New Year’s Resolutions
Your Password Manager Can Do More Than Just Store Passwords – By Suzanne Humphries reviewgeek.com
It’s common sense that everyone should be using a good password manager (we hope, at least). It’s also worth noting that password managers have tons of other amazing features that you might not be using. These features are both convenient and security-centric, and they can help you stay safe online and get the most out of your password manager.
The Trick to (Almost) Never Losing 2FA / MFA Access – By Anthony Heddings cloudsavvyit.com
Many people’s Facebook accounts are being hacked, and data leaks are rampant… We need extra security when it comes to online account protection, and 2FA / MFA is the solution. But what happens if your phone breaks? Here’s the trick…
LastPass review: Still the leading password manager, despite security history – By Rae Hodge cnet.com
“‘Don’t put all your eggs in one basket’ is all wrong. I tell you ‘put all your eggs in one basket, and then watch that basket,'” said industrialist Andrew Carnegie in 1885. When it comes to privacy tools, he’s usually dead wrong. In the case of password managers, however, Carnegie is usually more dead than wrong. To wit, I’ve been using LastPass so long I don’t know when I started using LastPass and, for now, I’ve got no reason to change that.
Why Aren’t Viruses a Problem on Chrome OS?– By Joe Fedewa howtogeek.com
Chrome OS has a reputation for being virus-proof. Google likes to boast about how secure its operating system is compared to others. Are Chromebooks really immune to viruses, though? And, if so, how do they achieve this? Allow us to explain.
Is It Worth Paying for a Password Manager? – By Julia Glummoney.com
Amid the explosion of COVID-19 phishing emails, fake coronavirus “treatments” and pandemic unemployment scams, it’s easy to forget about the basic steps you should be taking to protect your identity online.
You Should Be Using Yubikeys! – By Crosstalk Solutions youtube.com VIDEO
I switched to Yubikeys from Google Authenticator about a year ago, and I will never go back. Not only are they great for TOTP 2FA, but they do so much more!
How to secure your GMAIL account like a pro | YubiKey Tutorial – By Tristan Bolton youtube.com VIDEO
Basics of two-factor authentication with Bitwarden – By Gary Orenstein The Bitwarden Blog
Using two-factor authentication helps increase user security for websites and applications. The name refers to requiring users to utilize two separate methods of verifying their identity in order to access an account. A common definition for 2FA is that logging into a service involves something that you know, such as a password, and something that you have, such as your phone, hardware token, or other authentication code.
How password managers help prevent phishing – By Gary Orenstein bitwarden.com
If you are reading this, you already know the online vulnerabilities people face everyday on the internet. One of the most common threats is called “phishing,” where hackers with malicious intent (i.e. the bad guys) try to trick people into divulging confidential information like login credentials or bank account or social security numbers pretending to be someone or something that a person already trusts.
YouTube Doesn’t Know Your Password – By youtube.com VIDEO
A brief introduction to password hashing for the uninitiated — and why you should never trust a site that emails your password back to you!